15 Things Successful Entrepreneurs Do Every Day

The most effective entrepreneurs view themselves as assets. They continually invest in themselves and in their future through continuing education and self-improvement. If you want to become a better entrepreneur and successfully grow your business, dedicate time and energy to improve your daily habits.Here are 15 things many business influencers make time for in their busy schedules. ….. http://www.entrepreneur.com/article/235077

20-YEAR OLD VULNERABILITY PATCHED IN LZO COMPRESSION ALGORITHM

A 20-year old vulnerability in the Lempel-Ziv-Oberhumer (LZO) compression algorithm – used in some Android phones, the Linux kernel, and even Mars Rovers – was finally patched this week. Code stemming from the algorithm’s library function has existed in the wild for two decades, but was recycled over and over again, which made it tricky to patch. Version 2.07 of the algorithm fixes the longstanding issue – a subtle integer…

Snoopy drone can hack your smartphone when you’re on street !

According to the British experts from Sensepost Security, the project called Snoopy demonstrates the danger of using drones without clear rules. Sensepost created a distributed tracking and data interception framework, which performs simple tracking, real-time and historical profiling of devices and the peoples who own them. So it’s perhaps worth mentioning that Snoopy is a distributed framework compromised of various existing technologies. How does it works? Drones were the main…

Why Two-Factor Authentication Won’t Stop The Hacking Crisis ?

As high profile hacks continue to make news, “two-factor authentication” is becoming a household term. This year alone, Apple, Microsoft, and Evernote have rolled it out to users, and two weeks ago Wired reported that Twitter is developing a two-factor option of its own. Google and Facebook have had it since early 2011. It’s usually described in the media as a sort of silver bullet: Damaging Twitter hacks, the thinking goes, will…